Integration Guide. SafeNet Authentication Service. Using RADIUS and LDAP Protocols for Cisco Secure ACS
|
|
|
- Raymond Kristian Kelly
- 9 years ago
- Views:
Transcription
1 SafeNet Authentication Service Integration Guide Using RADIUS and LDAP Protocols for Cisco Secure ACS Technical Manual Template Release 1.0, PN: , Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1
2 Document Information Document Part Number , Rev. A Release Date June 2015 Trademarks All intellectual property is protected by copyright. All trademarks and product names used or referred to are the copyright of their respective owners. No part of this document may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, chemical, photocopy, recording, or otherwise, without the prior written permission of SafeNet, Inc. Disclaimer SafeNet makes no representations or warranties with respect to the contents of this document and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Furthermore, SafeNet reserves the right to revise this publication and to make changes from time to time in the content hereof without the obligation upon SafeNet to notify any person or organization of any such revisions or changes. We have attempted to make these documents complete, accurate, and useful, but we cannot guarantee them to be perfect. When we discover errors or omissions, or they are brought to our attention, we endeavor to correct them in succeeding releases of the product. SafeNet invites constructive comments on the contents of this document. These comments, together with your personal and/or company details, should be sent to the address or below. Contact Method Mail Contact Information SafeNet, Inc Millennium Drive Belcamp, Maryland 21017, USA [email protected] 2
3 Contents Contents Third-Party Software Acknowledgement... 4 Description... 4 Applicability... 5 Environment... 5 Audience... 5 RADIUS-based Authentication using SAS-SPE and SAS-PCE... 5 RADIUS Authentication Flow using SAS... 6 RADIUS Prerequisites... 7 Configuring SafeNet Authentication Service... 7 Synchronizing User Stores to SAS... 7 Assigning Authenticator in SAS... 8 Configuring Pre-authentication Rules... 8 Adding Cisco Secure ACS as an Authentication Node in SAS Checking the SAS RADIUS Server s IP Address Configuring Cisco ASA Creating a RADIUS-enabled AAA Server Group Adding an IP Address Pool Configuring a Group Policy Configuring a Connection Profile for Network (Client) Access Configuring Cisco Secure ACS Configuring Network Devices and AAA Clients Configuring User and Identity Stores Configuring Access Policies Running the Solution Using Clientless SSL VPN Using the Cisco AnyConnect Secure Mobility Client Support Contacts
4 Third-Party Software Acknowledgement This document is intended to help users of SafeNet products when working with third-party software, such as Cisco Secure ACS. Material from third-party software is being used solely for the purpose of making instructions clear. Screen images and content obtained from third-party software will be acknowledged as such. Description SafeNet Authentication Service delivers a fully automated, versatile, and strong authentication-as-a-service solution. With no infrastructure required, SafeNet Authentication Service provides smooth management processes and highly flexible security policies, token choice, and integration APIs. Cisco Secure Access Control Server (ACS) is an access policy control platform that helps you to comply with growing regulatory and corporate requirements. By integrating with your other access control systems, it can improve productivity and contain costs. It supports multiple scenarios simultaneously, including: Device administration Authenticates administrators, authorizes commands, and provides an audit trail Remote access Works with VPN and other remote network access devices to enforce access policies Wireless Authenticates and authorizes wireless users and hosts, and enforces wireless-specific policies Network admission control Communicates with posture and audit servers to enforce admission control policies Cisco Secure ACS uses two distinct protocols for authentication, authorization, and accounting (AAA) network security services Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access Control System (TACACS+). Cisco Adaptive Security Appliance (ASA) is a security device that combines firewall, antivirus, intrusion prevention, and virtual private network (VPN) capabilities. It provides a proactive threat defense that stops attacks before they spread through the network. Cisco ASA can be used as a security solution for both the small and large networks. This document describes how to: Deploy multi-factor authentication (MFA) options in Cisco Secure ACS using SafeNet OTP authenticators managed by SafeNet Authentication Service. Configure Cisco Secure ACS to work with SafeNet Authentication Service in RADIUS mode. Deploy two-step authentication using Cisco ASA and Cisco Secure ACS. For example, authenticating with two passwords the first password can be authenticated by SAS through the LDAP server, and the second password can be authenticated by SAS through the FreeRADIUS server. It is assumed that the Cisco Secure ACS and Cisco ASA environments are already configured and working with static passwords prior to implementing multi-factor authentication using SafeNet Authentication Service. Cisco Secure ACS can be configured to support multi-factor authentication in several modes. The RADIUS protocol will be used for the purpose of working with SafeNet Authentication Service. 4
5 Applicability The information in this document applies to: SafeNet Authentication Service Service Provider Edition (SAS-SPE) A server version that is used by Service Providers to deploy instances of SafeNet Authentication Service. SafeNet Authentication Service Private Cloud Edition (SAS-PCE) A server version that is used to deploy the solution on-premises in the organization. Environment The integration environment that was used in this document is based on the following software versions: SafeNet Authentication Service Private Cloud Edition (SAS-PCE) Version Cisco Secure ACS Version a Cisco ASA Version 9.2(2)4 ASDM Version 7.3(1)101 Cisco Secure Mobility Client Version Audience This document is targeted to system administrators who are familiar with Cisco Secure ACS, and are interested in adding multi-factor authentication capabilities using SafeNet Authentication Service. RADIUS-based Authentication using SAS-SPE and SAS-PCE For both on-premises versions, SAS can be integrated with the following solutions that serve as local RADIUS servers: Microsoft Network Policy Server (MS-NPS) or the legacy Microsoft Internet Authentication Service (MS-IAS) SafeNet Authentication Service is integrated with the local RADIUS servers using a special onpremises agent called SAS Agent for Microsoft IAS and NPS. For more information on how to install and configure the SAS Agent for Microsoft IAS and NPS, refer to the following document: FreeRADIUS The SAS FreeRADIUS Agent is a strong authentication agent that is able to communicate with SAS through the RADIUS protocol. 5
6 For more information on how to install and configure the SAS FreeRADIUS Agent, refer to the SafeNet Support Portal. This document demonstrates the solution using the SAS-PCE hosted RADIUS service. RADIUS Authentication Flow using SAS SafeNet Authentication Service communicates with a large number of VPN and access-gateway solutions using the RADIUS protocol. The image below describes the dataflow of a multi-factor authentication transaction for Cisco Secure ACS. 1. A user attempts to log on to Cisco ASA using Active Directory login credentials. 2. Cisco ASA sends the RADIUS request with the user s Active Directory credentials to Cisco Secure ACS. 3. Cisco Secure ACS sends the RADIUS request with the user s Active Directory credentials to SAS. 4. SAS sends the LDAP request with the user s Active Directory credentials to the LDAP server, that is, Microsoft Active Directory. 5. If LDAP authentication succeeds, SAS will send a RADIUS challenge to Cisco Secure ACS. Otherwise, the user will not be granted access. 6. Cisco Secure ACS sends the RADIUS challenge received from SAS to Cisco ASA. 7. Cisco ASA will send the RADIUS challenge to the user, and the RADIUS Challenge will be displayed on user s screen. The user will send the appropriate response with respect to that RADIUS Challenge. 8. The response will travel through the same channel as specified in steps 1, 2, and SAS will validate the response, and will send back a reply through the same channel in steps 5, 6, and The user is granted or denied access to Cisco ASA based on the RADIUS challenge-response value calculation results from SAS. 6
7 RADIUS Prerequisites To enable SafeNet Authentication Service to receive RADIUS requests from Cisco Secure ACS, ensure the following: End users can authenticate through the Cisco Secure ACS environment with a static password before configuring Cisco Secure ACS to use RADIUS authentication. Ports 1812/1813 are open to and from Cisco Secure ACS. A shared secret key has been selected. A shared secret key provides an added layer of security by supplying an indirect reference to a shared secret key. It is used by a mutual agreement between the RADIUS server and the RADIUS client for encryption, decryption, and digital signatures. Cisco AnyConnect Secure Mobility Client is installed on the client machine. SafeNet MobilePASS is enrolled as an OTP token in SAS. Configuring SafeNet Authentication Service The deployment of multi-factor authentication using SAS with Cisco Secure ACS using RADIUS protocol requires: Synchronizing User Stores to SAS, page 7 Assigning Authenticator in SAS, page 8 Configuring Pre-authentication Rules, page 8 Adding Cisco Secure ACS as an Authentication Node in SAS, page 13 Checking the SAS RADIUS Server s IP Address, page 15 Synchronizing User Stores to SAS Before SAS can authenticate any user in your organization, you must create a user store in SAS that reflects the users who need to use multi-factor authentication. User records are created in the SAS user store automatically, by synchronizing with your Active Directory /LDAP server using LDAP integration. For additional details on importing users to SafeNet Authentication Service, refer to Creating Users in the SafeNet Authentication Service Subscriber Account Operator Guide: SubscriberAccountOperatorGuide.pdf All SafeNet Authentication Service documentation can be found on the SafeNet Knowledge Base site. 7
8 Assigning Authenticator in SAS SAS supports a number of authentication methods that can be used as a second authentication factor for users who are authenticating through Cisco Secure ACS. The following authenticators are supported: etoken PASS RB-1 Keypad Token KT-4 Token SafeNet GOLD SMS Token MP-1 Software Token MobilePASS Authenticators can be assigned to users in two ways: Manual provisioning Assign an authenticator to users one at a time. Provisioning rules The administrator can set provisioning rules in SAS so that the rules will be triggered when group memberships and other user attributes change. An authenticator will be assigned automatically to the user. Refer to Provisioning Rules in the SafeNet Authentication Service Subscriber Account Operator Guide to learn how to provision the different authentication methods to the users in the SAS user store. SubscriberAccountOperatorGuide.pdf Configuring Pre-authentication Rules Just because a user is able to provide a valid, one-time passcode, does not necessarily mean that the user should be granted access to the network. Other conditions such as network access point, group membership, account status, and other attributes might be important in allowing or denying access. The key advantages of pre-authentication rules are: Rules can be applied to LDAP/Active Directory user account attributes. Rules can be applied to user accounts maintained in the internal SQL user data source. Rules can be applied based on network access points (source IP, Agent). Rules can be used to modify the authentication sequence (OTP, LDAP, LDAP + OTP). Changes made to user attributes in LDAP or the internal user data source are immediately effective on SafeNet Authentication Service. In this integration, we will create a rule to modify the LDAP+OTP authentication sequence. 8
9 1. Log in to the SAS console with an Operator account. 2. Click the COMMS tab, and then click Authentication Processing. 9
10 3. Under Authentication Processing, click Pre-authentication Rules. 4. Click New Rule. 10
11 5. Enter the following details, and then click Add below Add New Pre-Auth Rule: Rule Name: Description Filter Enter a name for your rule (for example, ldaprule). Enter the description of the rule (for example, LDAP rule). 1. Select LDAP password pass through, and then select Always. 2. In the If LDAP authentication fails menu, select reject the authentication. 3. In the If LDAP authentication succeeds menu, select force challenge response. 4. Click Add on the right side of the screen (see red box in screen below). The following condition is displayed: Always forward request to LDAP. If LDAP authentication fails reject the authentication. If LDAP authentication succeeds force challenge response. 11
12 6. Under Pre-Authentication Rules, select Enable Pre-Auth Rules. 7. Click Apply to enable this rule. 12
13 Adding Cisco Secure ACS as an Authentication Node in SAS Add a RADIUS entry in the SAS Auth Nodes module to prepare it to receive RADIUS authentication requests from Cisco Secure ACS. You will need the IP address of Cisco Secure ACS and the shared secret to be used by SAS and Cisco Secure ACS. 1. Log in to the SAS console with an Operator account. 2. Click the COMMS tab, and then click Auth Nodes. 3. In the Auth Nodes module, click the Auth Nodes link. 13
14 4. Under Auth Nodes, click Add. 5. In the Add Auth Node section, complete the following fields, and then click Save: Agent Description Host Name Low IP Address In Range Configure FreeRADIUS Synchronization Shared Secret Confirm Shared Secret Enter a host description. Enter the name of the host that will authenticate with SAS. Enter the IP address of the host that will authenticate with SAS. Select this option. Enter the shared secret key. Re-enter the shared secret key. The authentication node is added to the system. 14
15 Checking the SAS RADIUS Server s IP Address Before adding SAS as a RADIUS server in Cisco Secure ACS, check the IP address of the SAS RADIUS server. The IP address will be added to Cisco Secure ACS as a RADIUS server later in this document. 1. Log in to the SAS console with an Operator account. 2. Click the COMMS tab, and then click Auth Nodes. 3. In the Auth Nodes module, click the Auth Nodes link. The SAS RADIUS server details are displayed. 15
16 Configuring Cisco ASA Configuring Cisco ASA for two-step and multi-factor authentication requires the following: Creating a RADIUS-enabled AAA Server Group, page 16 Adding an IP Address Pool, page 21 Configuring a Group Policy, page 22 Configuring a Connection Profile for Network (Client) Access, page 24 Creating a RADIUS-enabled AAA Server Group To use an external AAA server for authentication, authorization, or accounting, you must first create at least one AAA server group per AAA protocol, and add one or more servers to each group. Identify AAA server groups by name. Each server group is associated with only one type of server, such as Kerberos, LDAP, NT, RADIUS, SDI, or TACACS+. 1. Open the Cisco Adaptive Security Device Manager (ASDM) for Cisco ASA. 2. On the Cisco ASDM-IDM Launcher window, complete the following fields, and then click OK. Device IP Address / Name Username Password Enter the IP address of Cisco ASA. Enter your username on Cisco ASA. Enter your password on Cisco ASA. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 3. On the main window, click the Configuration tab. 16
17 4. In the left pane, click the Remote Access VPN tab, and then click AAA/Local Users > AAA Server Groups. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 4. In the right pane, under AAA Server Groups, click Add. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 17
18 5. On the Add AAA Server Group window, complete the following fields, and then click OK. AAA Server Group Protocol Enter a name for the AAA Server Group (for example, radiusgroup). Select RADIUS. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 6. Under AAA Server Groups, select the newly created AAA server group (for example, radiusgroup). 18
19 7. Adjacent to the Servers in the Selected Group window, click Add. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 19
20 8. On the Add AAA Server window, complete the following fields, and then click OK. Interface Name Server Name or IP Address Select the interface to use to reach Cisco Secure ACS. Enter the server name or IP address of Cisco Secure ACS. Server Authentication Port Enter the RADIUS server authentication port (for example, 1812). Server Secret Key Enter the shared secret key. It should be same as entered in Cisco Secure ACS. Refer to section Configuring Network Devices and AAA Clients on page 28. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) This newly created AAA server will be added to the list under the Servers in the Selected Group section. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 9. Click Apply. 20
21 Adding an IP Address Pool Cisco ASA can use address pools for assigning IP addresses to the remote access clients. 1. Open the Cisco Adaptive Security Device Manager (ASDM) for Cisco ASA. 2. On the main window, click the Configuration tab. 3. In the left pane, click the Remote Access VPN tab, and then click Network (Client) Access > Address Assignment > Address Pools. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 4. In the right pane, click Add. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 5. On the Add IPv4 Pool window, complete the following fields, and then click OK. Name Starting IP Address Ending IP Address Subnet Mask Enter the name of the address pool, up to 64 characters (for example, vpnpool). Enter the first IP address available in the pool. The format of the IP address should be Enter the last IP address available in the pool. The format of the IP address should be Enter the subnet on which this IP pool resides. 21
22 (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 6. Click Apply. Configuring a Group Policy A group policy is a set of user-oriented attribute/value pairs for connections that are stored either internally (locally) on the device or externally on a RADIUS server. A connection profile uses a group policy that sets terms for user connections after the tunnel is established. Group policies let you apply whole sets of attributes to a user or a group of users, rather than having to specify each attribute for each user. Configure a group policy, which is present by default, in Cisco ASA. 1. Open the Cisco Adaptive Security Device Manager (ASDM) for Cisco ASA. 2. On the main window, click the Configuration tab. 3. In the left pane, click the Remote Access VPN tab, and then click Network (Client) Access > Group Policies. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 22
23 4. In the right pane, for the DfltGrpPolicy (System Default) group policy, ensure that in the Tunneling Protocol column, ssl-client and ssl-clientless are added. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 5. If ssl-client and ssl-clientless are not added in the Tunneling Protocol column, select the DfltGrpPolicy (System Default) group policy, click Edit, and perform the following steps: a. On the Edit Internal Group Policy window, click More Options. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 23
24 b. Adjacent to Tunneling Protocols, select the Clientless SSL VPN and SSL VPN Client options. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) c. Click OK. d. Click Apply. Configuring a Connection Profile for Network (Client) Access A connection profile consists of a set of records that determines tunnel connection policies. These records identify the servers to which the tunnel user is authenticated, as well as the accounting servers (if any), to which connection information is sent. A connection profile also identifies a default group policy for the connection, which contains protocol-specific connection parameters, including a small number of attributes that pertain to creating the tunnel itself. Connection profiles include a pointer to a group policy that defines user-oriented attributes. 1. Open the Cisco Adaptive Security Device Manager (ASDM) for Cisco ASA. 2. On the main window, click the Configuration tab. 3. In the left pane, click the Remote Access VPN tab, and then click Network (Client) Access > AnyConnect Connection Profiles. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 24
25 4. In the right pane, under Access Interfaces, perform the following steps: a. Select Enable Cisco AnyConnect VPN Client access on the interfaces selected in the table below. b. In the table, for each interface (outside and inside), under SSL Access, select Allow Access and Enable DTLS. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 5. In the right pane, under Connection Profiles, click Add. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 6. On the Add AnyConnect Connection Profile window, in the left pane, click Basic, and then complete the following fields: Name Aliases AAA Server Group Client Address Pools Enter the name of the connection profile (for example, safenetprofile). Enter the alias for the connection profile (for example, safenet). Select the AAA server group created in the section Creating a RADIUS-enabled AAA Server Group on page 16 (for example, radiusgroup). Click Select and assign an address pool. Group Policy Select an appropriate group policy (for example, DfltGrpPolicy). Select Enable SSL VPN client protocol. 25
26 (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 7. Click OK. 26
27 8. On the main window, in the right pane, under Login Page Setting, select Allow user to select connection profile on the login page. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 9. Click Apply. 27
28 Configuring Cisco Secure ACS Configuring Cisco Secure ACS for RADIUS authentication requires the following: Configuring Network Devices and AAA Clients, page 28 Configuring User and Identity Stores, page 29 Configuring Access Policies, page 31 Configuring Network Devices and AAA Clients It is important to remember that a device should be in the ACS repository before AAA requests from that device will be accepted. Add an AAA client to the ACS database and enable communications using the TACACS+ or RADIUS protocol. 1. Log on to Cisco Secure ACS. 2. On the main window, in the left pane, click Network Resources > Network Devices and AAA Clients. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 3. In the right pane, click Create. 4. Complete the following fields, and then click Submit: Name IP Enter a name for the network device (Cisco ASA). Enter the IP address of the RADIUS client. Authentication Options Select RADIUS. Shared Secret Enter the secret text shared between Cisco ASA and Cisco Secure ACS. 28
29 (The screen image above is from Cisco. Trademarks are the property of their respective owners.) Configuring User and Identity Stores Cisco Secure ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through Cisco Secure ACS requesting access to a particular network resource, Cisco Secure ACS authenticates the host and decides whether the host can communicate with the network resource. To authenticate and authorize a user or host, Cisco Secure ACS uses the user definitions in identity stores. There are two types of identity stores: Internal Identity stores that Cisco Secure ACS maintains locally (also called local stores) are called internal identity stores. For internal identity stores, Cisco Secure ACS provides interfaces for you to configure and maintain user records. External Identity stores that reside outside of Cisco Secure ACS are called external identity stores. Cisco Secure ACS requires configuration information to connect to these external identity stores to perform authentication and obtain user information. For authentication (second step authentication), in this integration, we will use external identity stores, that is, a RADIUS Identity Server. 1. Log on to Cisco Secure ACS. 2. On the main window, in the left pane, click Users and Identity Stores > External Identity Stores > RADIUS Identity Servers. 29
30 (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 3. In the right pane, click Create. 4. On the General tab, complete the following fields, and then click Submit: Name Hostname AAA Shared Secret Enter a name of your identity store (for example, radiusserver). Enter the IP address of the RADIUS Server. Enter the secret text shared between Cisco Secure ACS and the RADIUS server. Authentication Port Enter (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 30
31 Configuring Access Policies In Cisco Secure ACS, policy drives all activities. Policies consist mainly of rules that determine the action of the policy. You create access services to define authentication and authorization policies for requests. A global service selection policy contains rules that determine which access service processes an incoming request. 1. Log on to Cisco Secure ACS. 2. On the main window, in the left pane, click Access Policies > Access Services > Service Selection Rules. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 3. In the right pane, make sure that match Radius protocol is pointing to the Default Network Access service. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 31
32 4. In the left pane, click Access Policies > Access Services > Default Device Admin > Identity. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 5. In the right pane, in the Identity Source field, click Select. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 32
33 6. On the Identity Store window, select your identity source (for example, radiusserver), and then click OK. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 7. Click Save Changes. 33
34 Running the Solution You can use the following methods to securely connect to Cisco ASA: Using Clientless SSL VPN, page 34 Using the Cisco AnyConnect Secure Mobility Client, page 36 Using Clientless SSL VPN Clientless SSL VPN creates a secure, remote-access VPN tunnel to Cisco ASA using a web browser without requiring a software or hardware client. It provides secure and easy access to a broad range of web resources, and both web-enabled and legacy applications, from almost any device that can connect to the Internet via HTTP, including: Internal websites Web-enabled applications NT/Active Directory file shares proxies, including POP3S, IMP4S, and SMTPS Microsoft Outlook Web Access Exchange Server 2000, 2003, and 2007 Microsoft Web App to Exchange Server 2010 in 8.4(2) and later Application Access (smart tunnel or port forwarding access to other TCP-based applications) In this solution, the SafeNet MobilePASS is used as the enrolled OTP token. 1. Open the following URL in a web browser: IP Address of Cisco ASA>. The Login window is displayed. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 2. Enter your domain username and LDAP password, and then click Login. If the login credentials provided are authenticated successfully, the window shown in the next step will appear. 3. Generate a challenge-response from the MobilePASS token, and enter it in the Response field, and then click Continue. 34
35 (The screen image above is from Cisco. Trademarks are the property of their respective owners.) If authentication is successful, the VPN session will be established and you can access the service and application configured. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 35
36 Using the Cisco AnyConnect Secure Mobility Client The Cisco AnyConnect Secure Mobility Client provides remote users with secure VPN connections to the Cisco ASA using the Secure Socket Layer (SSL) protocol and the Datagram TLS (DTLS) protocol. AnyConnect provides remote end users with the benefits of a Cisco SSL VPN client, and supports applications and functions that are unavailable to a clientless, browser-based SSL VPN connection. In this solution, the SafeNet MobilePASS is used as the enrolled OTP token. 1. From the Windows Start menu, select All Programs > Cisco > Cisco AnyConnect Secure Mobility Client. 2. In the VPN field, enter the fully qualified domain name or IP address for Cisco ASA, and then click Connect. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) 3. Complete the following fields, and then click OK. Group Username Password Select an appropriate group alias (for example, safenet). Enter your domain user name. Enter the LDAP password. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) If LDAP authentication is successful, then the window shown in the next step will appear. Otherwise, authentication will get rejected. 36
37 4. Generate a challenge response from the MobilePASS token, and enter it in the Answer field, and then click Continue. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) If authentication is successful, the VPN session will be established, and you will see the following message on your system. (The screen image above is from Cisco. Trademarks are the property of their respective owners.) Support Contacts If you encounter a problem while installing, registering, or operating this product, please make sure that you have read the documentation. If you cannot resolve the issue, contact your supplier or SafeNet Customer Support. SafeNet Customer Support operates 24 hours a day, 7 days a week. Your level of access to this service is governed by the support plan arrangements made between SafeNet and your organization. Please consult this support plan for further information about your entitlements, including the hours when telephone support is available to you. Contact Method Address Contact Information SafeNet, Inc Millennium Drive Belcamp, Maryland USA Phone United States International Technical Support Customer Portal Existing customers with a Technical Support Customer Portal account can log in to manage incidents, get the latest software upgrades, and access the SafeNet Knowledge Base. 37
Integration Guide. SafeNet Authentication Service. Using RADIUS Protocol for Radiator RADIUS Server
SafeNet Authentication Service Integration Guide TechnicalManual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Apache HTTP Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Integration Guide. SafeNet Authentication Service. Using RADIUS Protocol for Cisco ASA
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copy right 2013 Saf enet, Inc. All rights reserv ed. 1 Document Information
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Integration Guide. SafeNet Authentication Service. VMWare View 5.1
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
SafeNet Authentication Service
SafeNet Authentication Service All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
SafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
SafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06
SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Integration Guide. SafeNet Authentication Service. Using SAS with Web Application Proxy. Technical Manual Template
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Integration Guide. SafeNet Authentication Client. Using SAC CBA for Check Point Security Gateway
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
Configuration Guide. SafeNet Authentication Service AD FS Agent
SafeNet Authentication Service AD FS Agent Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web App. Technical Manual Template
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Installation Guide. SafeNet Authentication Service
SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Agent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
SafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Integration Guide. SafeNet Authentication Client. Using SAC with Putty-CAC
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
Integration Guide. SafeNet Authentication Service. Oracle Secure Desktop Using SAS RADIUS OTP Authentication
SafeNet Authentication Service Integration Guide Oracle Secure Desktop Using SAS RADIUS OTP Authentication Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013
SafeNet Cisco AnyConnect Client. Configuration Guide
SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and
Synchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
Migration Guide. SafeNet Authentication Service. SafeWord/SAMx. Migration Guide: SafeNet Authentication Service. SafeWord/SAMx
SafeNet Authentication Service Migration Guide 1 Document Information Document Part Number 007-012524-001, Rev. C Release Date January 2015 Trademarks All intellectual property is protected by copyright.
Configuration Guide. SafeNet Authentication Service. Token Validator Proxy Agent
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
SafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
Configuration Guide. SafeNet Authentication Service. Remote Logging Agent
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Cisco ASA Authentication QUICKStart Guide
Cisco ASA Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved.
Juniper SSL VPN Authentication QUICKStart Guide
Juniper SSL VPN Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights
DIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505
INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this
User Guide. SafeNet MobilePASS for Windows Phone
SafeNet MobilePASS for Windows Phone User Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Product
Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
SafeNet Authentication Manager Express. Upgrade Instructions All versions
SafeNet Authentication Manager Express Upgrade Instructions All versions www.safenet-inc.com 4690 Millennium Drive, Belcamp, Maryland 21017 USA Telephone: +1 410 931 7500 or 1 800 533 3958 www.safenet-inc.com
Microsoft IAS and NPS Agent Configuration Guide
Microsoft IAS and NPS Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Agent IAS and NPS (Microsoft) Configuration
Microsoft IIS Integration Guide
Microsoft IIS Integration Guide Preface Preface 2015 SafeNet, Inc. All rights reserved. Part Number: 007-011955-001 (Rev E, 12/2015) All intellectual property is protected by copyright. All trademarks
Strong Authentication for Cisco ASA 5500 Series
Strong Authentication for Cisco ASA 5500 Series with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
SAS Agent for Outlook Web Access
SAS Agent for Outlook Web Access CUSTOMER RELEASE NOTES Version: 1.06 Build: 1.06.27725 Issue Date: 4 February 2015 Document Part Number: 007-012888-001, Rev. D Contents Product Description... 2 Release
Gemalto SafeNet Minidriver 9.0
SafeNet Authentication Client Gemalto SafeNet Minidriver 9.0 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document
Strong Authentication for Juniper Networks SSL VPN
Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
SafeNet MobilePASS Version 8.2.0, Revision B
SafeNet MobilePASS Version 8.2.0, Revision B User Guide Software Version 8.2.0 Documentation Version: 20101118 2012 SafeNet, Inc. All rights reserved Preface All intellectual property is protected by copyright.
Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief
Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents
Workspot Configuration Guide for the Cisco Adaptive Security Appliance
Workspot Configuration Guide for the Cisco Adaptive Security Appliance Workspot, Inc. 1/27/2015 Cisco ASA and Workspot Overview The Cisco Adaptive Security Appliance (ASA) provides organizations with secure,
Step by step guide to implement SMS authentication to Cisco ASA 5500 - Clientless SSL VPN and Cisco VPN
Installation guide for securing the authentication to your Cisco ASA 5500 Clientless SSL VPN and Cisco VPN Client Solutions with the Nordic Edge One Time Password Server, delivering strong authentication
Microsoft SQL Server Integration Guide
Microsoft SQL Server Integration Guide Document Information Document Part Number 007-011108-001 (Rev J) Release Date August 2013 Trademarks All intellectual property is protected by copyright. All trademarks
SAS Agent for Outlook Web App
SAS Agent for Outlook Web App CUSTOMER RELEASE NOTES Version: 1.08 Build: 1.08.579 Issue Date: 17 November 2015 Document Part Number: 007-012888-001, Rev. F Contents Product Description... 2 Release Description...
Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
Cisco ASA Implementation Guide (Version 5.4) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID,
Scenario: IPsec Remote-Access VPN Configuration
CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create
Preface. Microsoft Office Sharepoint Server 2007 Integration Guide. 2009 SafeNet, Inc. All rights reserved. Part Number: 009804-001 (Rev A, 06/2009)
Microsoft Office Sharepoint Server 2007 Integration Guide Preface Preface 2009 SafeNet, Inc. All rights reserved. Part Number: 009804-001 (Rev A, 06/2009) All intellectual property is protected by copyright.
External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Cisco ASA Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale Reading
Microsoft Dynamics GP Release
Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.
Active Directory Rights Management Service Integration Guide
Active Directory Rights Management Service Integration Guide Preface Preface 2013 SafeNet, Inc. All rights reserved. Part Number: 007-011230-001 (Rev F, 07/2013) All intellectual property is protected
BlackShield ID Best Practice
BlackShield ID Best Practice Implementation Guide for a Complex Network Document Scope This document is designed to demonstrate best practice when implementing and rolling out a two-factor authentication
Windows Server Update Services 3.0 SP2 Step By Step Guide
Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server
Configuration Guide. SafeNet Authentication Service. SAS Agent for PEAP
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release
Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release PB526545 Cisco ASA Software Release 8.2 offers a wealth of features that help organizations protect their networks against new threats
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
DIGIPASS Authentication for Check Point Security Gateways
DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and
Preface. Limitations. Disclaimers. Technical Support. Luna SA and IBM HTTP Server/IBM Web Sphere Application Server Integration Guide
Luna SA and IBM HTTP Server/IBM Web Sphere Application Server Integration Guide Preface Preface 2012 SafeNet, Inc. All rights reserved. Part Number: 007-012077-001 (Rev B, 06/2012) All intellectual property
INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN
INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management
ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Defender 5.7. Remote Access User Guide
Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
DIGIPASS Authentication for Check Point Connectra
DIGIPASS Authentication for Check Point Connectra With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 21 Disclaimer Disclaimer of Warranties and Limitations
SafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Microsoft Outlook Web App All information herein is either public information or is the
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide
Protecting Juniper SA using Certificate-Based Authentication Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X
QUICK START GUIDE Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X 1 Package Contents 1 Powering On the ASA 2 Connecting Interface Cables and Verifying Connectivity
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
HOTPin Integration Guide: DirectAccess
1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Strong Authentication for Juniper Networks
Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright
Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)
Installation guide for securing the authentication to your F5 Big-IP APM solution with Nordic Edge One Time Password Server, delivering strong authetication via SMS to your mobile phone. 1 Summary This
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
H3C SSL VPN RADIUS Authentication Configuration Example
H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by
Configuring RADIUS Authentication for Device Administration
Common Application Guide (CAG) Configuring RADIUS Authentication for Device Administration Introduction Configuring RADIUS Authentication for Device Administration The use of AAA services (Authentication,
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Novell Identity Manager
Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations
How to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
Secret Server Installation Windows Server 2012
Table of Contents Introduction... 2 ASP.NET Website... 2 SQL Server Database... 2 Administrative Access... 2 Prerequisites... 2 System Requirements Overview... 2 Additional Recommendations... 3 Beginning
INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass
INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security
DIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
SAS Token Validator Proxy Agent Configuration Guide
SAS Token Validator Proxy Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2014 SafeNet, Inc. All rights
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Scenario: Remote-Access VPN Configuration
CHAPTER 7 Scenario: Remote-Access VPN Configuration A remote-access Virtual Private Network (VPN) enables you to provide secure access to off-site users. ASDM enables you to configure the adaptive security
Microsoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
Security Provider Integration RADIUS Server
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
DIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
Introduction to Google Apps for Business Integration
Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.
Hands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS
Lab Manual Expediting WSUS Service for XP Embedded OS Summary In this lab, you will learn how to deploy the security update to your XP Pro or XP embedded images. You will also learn how to prepare the
ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook
ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access
Application Note. Intelligent Application Gateway with SA server using AD password and OTP
Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 30, 2005 Product Information Partner Name Juniper Networks Web Site www.juniper.net Product Name NetScreen SA Version
Fireware How To Authentication
Fireware How To Authentication How do I configure my Firebox to authenticate users against my existing RADIUS authentication server? Introduction When you use Fireware s user authentication feature, you
